拙网论坛

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 320|回复: 0

Be safe on the internet.

[复制链接]

949

主题

1001

帖子

3736

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
3736
发表于 2019-2-1 18:41:07 | 显示全部楼层 |阅读模式

https://securitycheckli.st/
Be safe on the internet.An open source checklist of resources designed to improve your online privacy and security. Check things off to keep track as you go.


Share

Tweet
[url=]
Share Link[/url]


Use a password managerHide details
A password manager helps you create a unique password for each online service you use. Having a unique password ensures that if one service you use is hacked, the compromised password won’t allow access to all of your other accounts.
At the very minimum, you should have a unique password for high-value accounts like Google, Apple, email, and banking accounts.


APPS
1Password



Sign up with Security Checklist to get 3 months free
LastPass

Dashlane

Bitwarden

Buttercup

Avast Passwords

iCloud Keychain



RESOURCES
How to use a password manager (and why you really should)

How password managers work and why you should use one

Password managers compared

Have I Been Pwned: Find out if your passwords have been hacked





Create a strong device passcodeHide details
A four-digit passcode for your phone or other devices is no longer considered secure. You should use a 6+ digit passcode at the very minimum, and for extra security use a 6+ character passcode containing both numbers and letters. TouchID and FaceID should be turned off when traveling internationally.
You should enforce a strict lock policy on your devices. Always require a passcode and ensure that a device is not left unattended for more than a minute or two.


RESOURCES
How long it takes to break a passcode

How to temporarily disable TouchID or FaceID

Changing your iOS passcode

Changing your Android passcode





Use two-factor authenticationHide details
Two-factor authentication (2FA) adds an extra layer of security on top of passwords. It ensures that someone logging into an account is who they say they are by requiring an extra piece of information besides the account password.
This extra information is usually either something you know, something you have, or something you are - for example, a biometric signal like FaceID.
You should not use your phone number as a two-factor method.
At minimum 2FA should be installed on accounts that can lock you out of other accounts: e.g. a Google account, email applications, an Apple ID, and financial accounts. For stronger security, ensure that 2FA is enabled on every service you use that supports it.
Note: Using an all-in-one solution like 1Password for both password management and 2FA creates a single point of failure. Take this into account when picking your 2FA client.


APPS
1Password



Sign up with Security Checklist to get 3 months free
Authy

Google Authenticator

Show more choices


RESOURCES
What is two-factor authentication?

Two-factor authentication: a little goes a long way

So hey, you should stop using texts for two-factor authentication





Set up a mobile carrier PINHide details
SIM hijacking is a process where a hacker socially engineers or bribes a mobile carrier to transfer your phone number to a SIM card they own.
If you use text messages as a two-factor authentication method, this gives hackers the ability to bypass 2FA and in most cases the ability to reset your passwords completely.
You should enable a carrier security PIN. This PIN will be used before a carrier can make changes to your SIM cards or mobile account settings.


RESOURCES
SIM swap attacks and what you need to know

SIM hijacking explained

Verizon FAQ

AT&T FAQ

T-Mobile FAQ





Encrypt your devicesHide details
If your phone or computer is ever stolen, a thief may try to read or export your personal data. If your device is unencrypted, hackers will have access to anything stored on that device, including photos, emails, documents, and contacts.
You should enable encryption on every phone and computer you use. Encrypting your devices makes it nearly impossible for a thief to read your data without having your encryption password.


RESOURCES
Why you should encrypt your computer

Why you should be encrypting your devices, and how to easily do it

Encrypt your iOS backups

Encrypt your Android devices

Enable full-disk encryption on Windows PCs

Encrypt your Mac





Freeze Your CreditHide details
If you live in the United States, you should safely assume that hackers have access to your credit report, social security number, address history, and personal contact information. It is important that hackers with this knowledge are not able to open new lines of credit or make large purchases in your name.
You should enable a freeze on all credit report checks at the three major credit bureaus. Whenever you want to open a new line of credit or make a credit-backed purchase (for example, the iPhone Upgrade Program), you can create a "credit thaw" that will allow legitimate credit checks to be processed within a predetermined amount of time.
Ensure that you enable a freeze at all three credit bureaus.


RESOURCES
FTC Credit Freeze FAQs

Freezing credit will now be free; here’s why you should go for it

7 things you should know before freezing your credit

Experian Freeze

Equifax Freeze

TransUnion Freeze





Change your DNS settings to 1.1.1.1 or 9.9.9.9Hide details
DNS (Domain Name Servers) are the internet's equivalent of a phone book. They translate a name like 'google.com' into an IP address. By default, DNS is slow and insecure. Many internet service providers track and log data that flows through DNS, in some cases reselling this data to advertisers.
Cloudflare has released a privacy and performance-focused DNS tool that protects your internet traffic from internet service providers and people snooping on public Wi-Fi networks. 1.1.1.1 is faster than the average DNS service as well, making it faster to use the internet.
An alternative to Cloudflare is Quad9, which emphasizes security and privacy in your everyday browsing. It has been launched as a non-profit by the Global Cyber Alliance, IBM and Packet Clearing House, to protect you by blocking known malicious domains, and by not collecting any identifying data on their systems.


APPS
1.1.1.1

9.9.9.9



RESOURCES
What is 1.1.1.1?

Cloudflare launches 1.1.1.1 DNS service that will speed up your internet

Cloudflare’s privacy-focused 1.1.1.1 is available on phones

New “Quad9” DNS service blocks malicious domains for everyone

Quad9, a Public DNS Resolver - with Security

Cloudflare and Quad9 Aim to Improve DNS





Use a VPNHide details
A VPN, or virtual private network, is a useful tool to secure an internet connection. It guarantees that data you are sending and receiving is encrypted, preventing people from snooping on your traffic.
You should use a VPN provider that you trust to not harvest and re-sell your data. The best VPNs often charge a monthly subscription - this is a good thing because it means their business model is not reliant upon reselling your data to advertisers.


APPS
IVPN

Encrypt.me

ExpressVPN

Show more choices


RESOURCES
Why you should be using a VPN

What is a VPN and why you need one

Why you should use a VPN on a public Wi-Fi network

A detailed VPN provider comparison chart





Review the privacy of your physical spaceHide details
You should add a webcam cover on your laptop and desktop computers. A webcam cover provides peace of mind when entering and exiting video calls that you are only visible when you choose to be.
You should protect yourself from people shoulder-surfing when working in a public space, such as a cafe or on a plane. A privacy screen blocks side views outside a 60 degree viewing angle.


RESOURCES
Webcam covers (3 pack) on Amazon · No affiliate link

Laptop privacy screen reviews





Use a privacy-first web browserHide details
You should use a web browser that protects you from tracking, fingerprinting, and unwanted advertisements.
Modern browsers have made it simple to transfer your bookmarks and preferences in order to reduce switching pains.


APPS
Brave

Firefox

Safari

Show more choices


RESOURCES
Don’t expect privacy from Chrome

Google Chrome‘s users take a back seat to its bottom line

What data of mine does Chrome send to Google?

Firefox multi-account containers

How to protect yourself from browser fingerprinting

Browser fingerprinting, and why they are so hard to erase

Who Tracks Me - Learn about tracking technologies, market structure and data-sharing on the web.





Use a privacy-first search engineHide details
You should use a search engine that protects you from tracking, fingerprinting, and unwanted advertisements. DuckDuckGo is a privacy-first search engine that does not store your search history, has strict location and personalization permissions, and publishes regular content teaching people how to be safer on the web.


APPS
DuckDuckGo



RESOURCES
DuckDuckGo Privacy

About DuckDuckGo

DuckDuckGo: No, we’re not using fingerprinting to track you

Everything Google knows about you





Use a privacy-first email providerHide details
You should use an email provider that doesn’t read your email or gather data about your conversations to target you with ads.


APPS
FastMail

ProtonMail

Tutanota

Show more choices


RESOURCES
Gmail vs FastMail

Stop the paranoia: it doesn’t matter if Google reads our email

How Google is destroying privacy and collecting your data





Review location, camera, and other sensitive device permissionsHide details
You should review all applications that have access to your photos, camera, location, and microphone. Ensure that you trust apps with sensitive permissions.


RESOURCES
iOS camera permissions allow rogue apps to surreptitiously photograph & video users

How to stop your iPhone from tracking locations you frequently visit

How to manage app permissions on iOS

How to manage app permissions on Android

How to manage app permissions on macOS

How to manage app permissions on Windows

Apps and services with access to your Google account

Apps and services with access to your Facebook account

Apps and services with access to your Twitter account





Review and remove metadata attached to photos you shareHide details
Geotagging is the process of adding geographical identification to media files (photos and videos, for example). Anyone who has access to these tagged media files can read this data and learn where the photo was taken. Most social media sites strip the EXIF data from photos, but if you're hosting your own photos, be aware that the geolocation can give away your exact location.
You should understand how location metadata is attached to your media and take steps to ensure you are not uploading sensitive information with your files.


RESOURCES
Are Location-Tagged Photos Really a Privacy Concern?

Software Roundup: 5 of The Best Apps to Remove EXIF Data from Images

Geotagging

What is geotag security and how it helps to protect your family

Web photos that reveal secrets, like where you live

How to avoid the potential risks of geotagging

How to turn off geotagging for photos on iPhone and iPad

How To turn off geotagging on Android devices





Review your social media privacy settingsHide details
Over the years social media companies are able to gather staggering amounts of data about you, your interests, who you talk to, where you go, what you buy, and so much more.
If you‘re not ready to give up social media quite yet, you should take the time to review your security and privacy settings. Visualizing the amount of information that social media companies know about you may be enough to curb that unhealthy newsfeed obsession.


RESOURCES
Facebook privacy settings

Facebook ad personalization settings

Facebook location history

Facebook face recognition settings

Your Facebook information

Facebook security settings

Twitter personalization settings

Twitter privacy and safety settings

Google activity

Google location history

Google ad personalization settings

Google purchase history

Google subscription history

Google reservation history

re:consent browser extension gives you more privacy control on the web





Use encrypted messaging apps when sharing sensitive informationHide details
When sharing sensitive information over chat, you should be using a secure, end-to-end encrypted messaging service. End-to-end encryption ensures that only you and your intended recipient are able to view messages. Your messages will appear scrambled (and will be nearly-impossible to unscramble) to anyone else, including app developers and ISPs.


APPS
iMessage

WhatsApp

Signal



RESOURCES
What is end-to-end encryption?

Hacker lexicon: end-to-end encryption

Encrypted messaging isn’t magic

Why you need a better handle on the WhatsApp, Signal and Telegram apps

The best and worst encrypted messaging apps





Educate yourself about phishing attacksHide details
Phishing is an attempt to obtain sensitive information (like an account password) by disguising as a trustworthy person or company. Phishing often occurs via email where a hacker will use social engineering to convince someone to click a link that goes to a fake login page. The fake login page then sends anything the victim types (including usernames and passwords) to the hacker.
In recent years phishing attacks have become increasingly sophisticated and hackers are learning to use data that people put on the web to create highly specific and targeted attacks.
Smart people are not immune to phishing.
You should learn the basics of phishing and how to identify a phishing attempt.


RESOURCES
Podcast: What kind of idiot gets phished?

Common phishing attacks and how to protect against them

Resisting phishing attacks with three golden rules

Google Password Alert Chrome extension





Keep your devices up to dateHide details
Many of the most damaging hacks in recent history were only possible because someone failed to update software. While update notifications delivered by your smartphone, computer, and other internet-connected devices can be disruptive, applying those updates in a timely manner is the single-most effective action you can take to protect yourself from these types of attacks.
You should apply software updates to every device you own as soon as they are made available, and develop a habit of checking for updates on devices that do notnotify you of available patches to ensure their security.


RESOURCES
Stop putting off your device updates—here's why

Rarely Patched Software Bugs in Home Routers Cripple Security

Why Installing Software Updates Makes Us WannaCry

Everything You Ever Wanted to Know About Microsoft Windows Updates

Patching Is Failing as a Security Paradigm






回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|抱朴守拙BBS

GMT+8, 2025-5-25 22:44 , Processed in 0.191087 second(s), 18 queries .

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表